The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] MPO(945hit)

521-540hit(945hit)

  • Nonlinear Estimation of Harmonic Signals

    Kiyoshi NISHIYAMA  

     
    PAPER-Digital Signal Processing

      Vol:
    E90-A No:5
      Page(s):
    1021-1027

    A nonlinear harmonic estimator (NHE) is proposed for extracting a harmonic signal and its fundamental frequency in the presence of white noise. This estimator is derived by applying an extended complex Kalman filter (ECKF) to a multiple sinusoidal model with state-representation and then efficiently specializing it for the case of harmonic estimation. The effectiveness of the NHE is verified using computer simulations.

  • Schmidt Decomposition for Quantum Entanglement in Quantum Algorithms

    Kazuto OSHIMA  

     
    LETTER

      Vol:
    E90-A No:5
      Page(s):
    1012-1013

    We study quantum entanglement by Schmidt decomposition for some typical quantum algorithms. In the Shor's exponentially fast algorithm the quantum entanglement holds almost maximal, which is a major factor that a classical computer is not adequate to simulate quantum efficient algorithms.

  • A Stochastic Dynamic Local Search Method for Learning Multiple-Valued Logic Networks

    Qiping CAO  Shangce GAO  Jianchen ZHANG  Zheng TANG  Haruhiko KIMURA  

     
    PAPER-Neural Networks and Bioengineering

      Vol:
    E90-A No:5
      Page(s):
    1085-1092

    In this paper, we propose a stochastic dynamic local search (SDLS) method for Multiple-Valued Logic (MVL) learning by introducing stochastic dynamics into the traditional local search method. The proposed learning network maintains some trends of quick descent to either global minimum or a local minimum, and at the same time has some chance of escaping from local minima by permitting temporary error increases during learning. Thus the network may eventually reach the global minimum state or its best approximation with very high probability. Simulation results show that the proposed algorithm has the superior abilities to find the global minimum for the MVL network learning within reasonable number of iterations.

  • Simple Precoding for QR-Decomposition MLD Incorporated with PIC in MIMO-OFDM Systems

    Masaaki FUJII  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E90-B No:5
      Page(s):
    1266-1269

    A precoding scheme is described for multiple-input and multiple-output orthogonal frequency-division multiplexing systems with a QR-decomposition maximum likelihood detector (MLD) incorporated with a parallel interference canceller (PIC) at a receiver. Transmit antenna ranking based on received substream signal power or per-substream minimum Euclidean distances is fed back to a transmitter. Based on the ranking information, precoding matrices are determined as permutation matrices such that specific packets are transmitted from transmit antennas with higher channel quality over the whole subcarriers. The simulation results demonstrated that precoding effectively utilizes PIC by reducing the possibility that all substreams are incorrectly decoded and thus improves the transmission performance of a QR-decomposition MLD with PIC.

  • A Tableau Construction Approach to Control Synthesis of FSMs Using Simulation Relations

    Yoshisato SAKAI  

     
    PAPER

      Vol:
    E90-A No:4
      Page(s):
    836-846

    We propose a new tableau construction which builds an FSM, instead of a Kripke structure, from a formula in a class of temporal logic named ASTL. This FSM is a maximal model of the formula under the preorder derived from simulation relations. Additionally, we propose a method using the tableaus to build controllers in a certain topology of interconnected FSMs. We can use ASTL to describe the desired behaviors of the control system. This method is applicable to generating digital circuits. Moreover, this method accepts a wider range of specifications than conventional methods.

  • An EM-Based Approach for Mining Word Senses from Corpora

    Thatsanee CHAROENPORN  Canasai KRUENGKRAI  Thanaruk THEERAMUNKONG  Virach SORNLERTLAMVANICH  

     
    PAPER-Natural Language Processing

      Vol:
    E90-D No:4
      Page(s):
    775-782

    Manually collecting contexts of a target word and grouping them based on their meanings yields a set of word senses but the task is quite tedious. Towards automated lexicography, this paper proposes a word-sense discrimination method based on two modern techniques; EM algorithm and principal component analysis (PCA). The spherical Gaussian EM algorithm enhanced with PCA for robust initialization is proposed to cluster word senses of a target word automatically. Three variants of the algorithm, namely PCA, sGEM, and PCA-sGEM, are investigated using a gold standard dataset of two polysemous words. The clustering result is evaluated using the measures of purity and entropy as well as a more recent measure called normalized mutual information (NMI). The experimental result indicates that the proposed algorithms gain promising performance with regard to discriminate word senses and the PCA-sGEM outperforms the other two methods to some extent.

  • Application of Topology Optimization to H-Plane Waveguide Component

    Koichi HIRAYAMA  Yasuhide TSUJI  Tsuyoshi NOMURA  Kazuo SATO  Shinji NISHIWAKI  

     
    PAPER-Numerical Techniques, Computational Electromagnetic

      Vol:
    E90-C No:2
      Page(s):
    282-287

    We investigate the usefulness of the topology optimization with the finite element method in the optimization of an H-plane waveguide component. Design sensitivity is computed efficiently using the adjoint variable method. Employing the optimization procedure, optimized structures of an H-plane waveguide filter and T-junction are obtained from an initial homogeneous structure.

  • Frequency-Interleaved Spread Spectrum with MMSE Frequency-Domain Equalization

    Kazuaki TAKEDA  Fumiyuki ADACHI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E90-B No:2
      Page(s):
    260-268

    The use of frequency-domain equalization (FDE) based on minimum mean square error (MMSE) criterion can significantly improve the downlink bit error rate (BER) performances of DS- and MC-CDMA in a frequency-selective fading channel. However, the uplink BER performance degrades due to a strong multi-user interference (MUI). In this paper, we propose frequency-interleaved spread spectrum (SS) using MMSE-FDE, in which the subcarrier components of each user's signal are interleaved onto a wider bandwidth. Then, the frequency-interleaved frequency-domain signal is transformed into a time-domain signal by the inverse fast Fourier transform (IFFT). Frequency-interleaving patterns assigned to different users are orthogonal to each other. The proposed scheme can avoid the MUI completely while achieving frequency diversity gain due to MMSE-FDE. It is shown by computer simulation that the use of frequency-interleaving can significantly improve the uplink performance in a frequency-selective Rayleigh fading channel.

  • Distortion Reduction Filters for Radio-on-Fiber System

    Shingo TANAKA  Noritaka TAGUCHI  Tsuneto KIMURA  Yasunori ATSUMI  

     
    PAPER

      Vol:
    E90-C No:2
      Page(s):
    365-372

    Three distortion reduction filters for radio-on-fiber systems are proposed and evaluated from the standpoint of improvements in in-band third order intermodulation (IM3) components (spurious components), insertion loss, temperature stability and so on. The basic filter configuration includes optical comb filter, RF (radiowave frequency) comb filter, and RF dual band rejection filter (DBRF). Experiments are conducted at 2 GHz band for frequency separation Δf=5 MHz and 100 MHz in the temperature range of -10 to +50. These filters can reduce IM3 components even in the saturation region, unlike conventional linearizers. An optical comb filter can reduce IM3 components more than 20 dB and noise level around 10 dB if its polarization controller is properly adjusted, but its insertion loss is large and stability against vibration is very poor. The proposed RF comb filter and RF-DBRF can reduce IM3 components by more than 20 dB and noise level by more than 3 dB. Their stability against vibration and temperature change is good, and insertion losses are 1-2 dB for Δf=100 MHz.

  • A Numerical Solution for Electromagnetic Scattering from Large Faceted Conducting Bodies by Using Physical Optics-SVD Derived Bases

    Gianluigi TIBERI  Agostino MONORCHIO  Giuliano MANARA  Raj MITTRA  

     
    PAPER-Scattering and Diffraction

      Vol:
    E90-C No:2
      Page(s):
    252-257

    A novel procedure for an efficient and rigorous solution of electromagnetic scattering problems is presented. It is based on the use of universal bases that are obtained by applying the SVD procedure to PO-derived basis functions. These bases, constructed by totally bypassing any matrix-type approach, can be used for all angles of incidence and their use leads to a matrix with relatively small dimensions. The method enables us to solve 2D scattering problems in a computationally efficient and numerically rigorous manner.

  • Chroma Key Using a Checker Pattern Background

    Hiroki AGATA  Atsushi YAMASHITA  Toru KANEKO  

     
    PAPER

      Vol:
    E90-D No:1
      Page(s):
    242-249

    In this paper, we propose a new region extraction method using chroma key with a two-tone checker pattern background. The method solves the problem in conventional chroma key techniques that foreground objects become transparent if their colors are the same as the background color. The method utilizes the adjacency condition between two-tone regions of the background and the geometrical information of the background grid line. The procedure of the proposed method consists of four steps: 1) background color extraction, 2) background grid line extraction, 3) foreground extraction, and 4) image composition. As to background color extraction, a color space approach is used. As to background grid line extraction, it is difficult to extract background grid line by a color space approach because the color of this region may be a composite of two background colors and different from them. Therefore, the background grid line is extracted from adjacency conditions between two background colors. As to foreground extraction, the boundary between the foreground and the background is detected to recheck the foreground region whose color is same as the background, and the background region whose color is same as the foreground. To detect regions whose colors are same as the background, the adjacency conditions with the background grid line are utilized. As to image composition, the process that smoothes the color of the foreground's boundary against the new background is carried out to create natural images. Experimental results show that the foreground objects can be segmented exactly from the background regardless of the colors of the foreground objects.

  • A Robust Detection Scheme of Orthogonal Space-Time Block Codes over Very Fast Fading Channels

    Donghun YU  Jae Hong LEE  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E90-B No:1
      Page(s):
    171-175

    This letter proposes a robust detection scheme of orthogonal space-time block codes that face very fast fading channels. The proposed detection scheme employs a QR decomposition on the channel matrix and minimizes noise enhancement and impact of channel estimation errors which occur in a conventional detection scheme. It is shown by simulations that the proposed detection scheme outperforms the conventional detection scheme when the channel fading is very fast.

  • Universally Composable Hierarchical Hybrid Authenticated Key Exchange

    Haruki OTA  Kazuki YONEYAMA  Shinsaku KIYOMOTO  Toshiaki TANAKA  Kazuo OHTA  

     
    PAPER-Protocols

      Vol:
    E90-A No:1
      Page(s):
    139-151

    Password-based authenticated key exchange protocols are more convenient and practical, since users employ human-memorable passwords that are simpler to remember than cryptographic secret keys or public/private keys. Abdalla, Fouque, and Pointcheval proposed the password-based authenticated key exchange protocol in a 3-party model (GPAKE) in which clients trying to establish a secret do not share a password between themselves but only with a trusted server. On the other hand, Canetti presented a general framework, which is called universally composable (UC) framework, for representing cryptographic protocols and analyzing their security. In this framework, the security of protocols is maintained under a general protocol composition operation called universal composition. Canetti also proved a UC composition theorem, which states that the definition of UC-security achieves the goal of concurrent general composition. A server must manage all the passwords of clients when the 3-party password-based authenticated key exchange protocols are realized in large-scale networks. In order to resolve this problem, we propose a hierarchical hybrid authenticated key exchange protocol (H2AKE). In H2AKE, forwarding servers are located between each client and a distribution server, and the distribution server sends the client an authentication key via the forwarding servers. In H2AKE, public/private keys are used between servers, while passwords are also used between clients and forwarding servers. Thus, in H2AKE, the load on the distribution server can be distributed to the forwarding servers concerning password management. In this paper, we define hierarchical hybrid authenticated key exchange functionality. H2AKE is the universal form of the hierarchical (hybrid) authenticated key exchange protocol, which includes a 3-party model, and it has the characteristic that the construction of the protocol can flexibly change according to the situation. We also prove that H2AKE is secure in the UC framework with the security-preserving composition property.

  • Reduced-Complexity Iterative Decoding of Serially Concatenated CPM

    Heon HUH  James V. KROGMEIER  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E90-B No:1
      Page(s):
    148-151

    This letter develops an efficient CPM demodulator which provides soft outputs for use in coded CPM. The proposed algorithm offers reduced-complexity soft output detection in which the number of matched filters and trellis states is appreciably reduced. The complexity reduction is achieved by approximating the CPM signal using the Laurent representation. A simulation study of iterative decoding of serially concatenated CPM with an outer code was performed. The performance degradation of the proposed algorithm relative to optimal full complexity generation of soft outputs was found to be small.

  • On the Expected Prediction Error of Orthogonal Regression with Variable Components

    Katsuyuki HAGIWARA  Hiroshi ISHITANI  

     
    PAPER-Algorithms and Data Structures

      Vol:
    E89-A No:12
      Page(s):
    3699-3709

    In this article, we considered the asymptotic expectations of the prediction error and the fitting error of a regression model, in which the component functions are chosen from a finite set of orthogonal functions. Under the least squares estimation, we showed that the asymptotic bias in estimating the prediction error based on the fitting error includes the true number of components, which is essentially unknown in practical applications. On the other hand, under a suitable shrinkage method, we showed that an asymptotically unbiased estimate of the prediction error is given by the fitting error plus a known term except the noise variance.

  • Fast Acquisition of PN Sequences in DS-CDMA Systems with Incoherent Demodulator

    Sergei BYCHENKOV  Vladimir MIKHAILOV  Kohichi SAKANIWA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E89-B No:12
      Page(s):
    3319-3334

    DS-CDMA systems employing long-period PN sequences are becoming a widespread standard of wireless communication systems. However, fast acquisition of long-period PN sequences at a low hardware cost is conventionally a difficult problem. This paper examines a recently proposed fast acquisition algorithm for a class of PN sequences, which includes m and GMW sequences as special cases, under conditions of unknown received RF phase and chip boundary timing. The result shows that under low input (chip) SNR and the required delay estimation accuracy of Tc/Δ, Δ=2,3,…, the mean acquisition time can be considerably reduced compared to other known representative acquisition schemes. Its fast acquisition capability is based on a decomposition of long PN sequences into a number of short ones and achieves a significantly reduced code phase uncertainty of acquisition at relatively small hardware cost, estimated as 2/3 of the equivalent parallel correlators system. It can be applied as a (part of) acquisition scheme of a DS-CDMA system instead of a slow sliding correlator or a costly matched filter schemes.

  • 2D Beam Scanning Planar Antenna Array Using Composite Right/Left-Handed Leaky Wave Antennas

    Tokio KANEDA  Atsushi SANADA  Hiroshi KUBO  

     
    PAPER-Planar Antennas

      Vol:
    E89-C No:12
      Page(s):
    1904-1911

    A novel two-dimensional (2D) beam scanning antenna array using composite right/left-handed (CRLH) leaky-wave antennas (LWAs) is proposed. The antenna array consists of a set of CRLH LWAs and a Butler matrix (BM) feeding network. The direction of the beam can be scanned two-dimensionally in one plane by changing frequency and in the other plane by switching the input ports of the BM. A four-element antenna array in the microstrip line configuration operating at 10.5 GHz is designed with the assistance of full-wave simulations based on the method of moment (MoM) and the finite-element method (FEM). The antenna array is fabricated and radiation characteristics are measured. The wide range 2D beam scanning operation with the angle from -30 deg to +25 deg in one plane by sweeping frequency from 10.25 GHz to 10.7 GHz and with four discrete angles of -46 deg, -15 deg, +10 deg, and +35 deg in the other plane by switching the input port is achieved.

  • A PC-Based Logic Simulator Using a Look-Up Table Cascade Emulator

    Hiroki NAKAHARA  Tsutomu SASAO  Munehiro MATSUURA  

     
    PAPER-Simulation and Verification

      Vol:
    E89-A No:12
      Page(s):
    3471-3481

    This paper represents a cycle-based logic simulation method using an LUT cascade emulator, where an LUT cascade consists of multiple-output LUTs (cells) connected in series. The LUT cascade emulator is an architecture that emulates LUT cascades. It has a control part, a memory for logic, and registers. It connects the memory to registers through a programmable interconnection circuit, and evaluates the given circuit stored in the memory. The LUT cascade emulator runs on an ordinary PC. This paper also compares the method with a Levelized Compiled Code (LCC) simulator and a simulator using a Quasi-Reduced Multi-valued Decision Diagram (QRMDD). Our simulator is 3.5 to 10.6 times faster than the LCC, and 1.1 to 3.9 times faster than the one using a QRMDD. The simulation setup time is 2.0 to 9.8 times shorter than the LCC. The necessary amount of memory is 1/1.8 to 1/5.5 of the one using a QRMDD.

  • Checking Connectivity in Mobile System Ambients with the Temporal Logic of Actions

    Tatjana KAPUS  

     
    PAPER-Concurrent Systems

      Vol:
    E89-A No:11
      Page(s):
    3333-3340

    This paper considers systems consisting of communicating processes which can move between specified locations. Mobile telephone systems and intelligent transport systems are examples of them. The processes can exchange data as well as channels (e.g. frequencies) to be used in further communication. It may happen that two processes (e.g. telephones or cars) in different locations could communicate directly because they share a communication channel, but they cannot as there is a physical obstacle between the locations. A possible solution is to allow one process to send a message to another one through other processes and locations. To see if this is possible, a notion of connectivity of processes has been devised in the literature. A process was defined to be connectable to another one if a message from the first one could reach the other one by using any existing communication actions, allowed locations, and process moves in the system. A process-algebraic approach for checking connectivity was proposed. In this paper, it is shown how the temporal logic of actions (TLA) can be employed for the same purpose. In both approaches, connectivity of a process with another one is basically checked as follows. The first process includes a marking message in all its sending actions. Every process that receives this message gets marked and includes it in its own sending actions. The first process is connectable to the second one if there exists such a system execution sequence that the latter gets marked in it. Since TLA is a linear-time temporal logic, it can generally not express such a property. This paper, however, shows that it can be expressed and verified for a given TLA system specification. It also shows how to specify the marking operations and provides an example of connectivity checking.

  • Doubly Stochastic Processing on Jacket Matrices

    Jia HOU  Moon Ho LEE  Kwangjae LEE  

     
    LETTER-General Fundamentals and Boundaries

      Vol:
    E89-A No:11
      Page(s):
    3368-3372

    In this letter, we define the generalized doubly stochastic processing via Jacket matrices of order-2n and 2n with the integer, n≥2. Different from the Hadamard factorization scheme, we propose a more general case to obtain a set of doubly stochastic matrices according to decomposition of the fundaments of Jacket matrices. From order-2n and order-2n Jacket matrices, we always have the orthostochastoc case, which is the same as that of the Hadamard matrices, if the eigenvalue λ1 = 1, the other ones are zeros. In the case of doubly stochastic, the eigenvalues should lead to nonnegative elements in the probability matrix. The results can be applied to stochastic signal processing, pattern analysis and orthogonal designs.

521-540hit(945hit)